US5351295A - Secure method of neighbor discovery over a multiaccess medium - Google Patents
Secure method of neighbor discovery over a multiaccess medium Download PDFInfo
- Publication number
- US5351295A US5351295A US08/086,596 US8659693A US5351295A US 5351295 A US5351295 A US 5351295A US 8659693 A US8659693 A US 8659693A US 5351295 A US5351295 A US 5351295A
- Authority
- US
- United States
- Prior art keywords
- station
- password
- identification
- stations
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- This invention relates to the finding of neighbors across a multi-access communications medium with a minimum of preloaded configuration information. It relates more particularly to a secure arrangement for auto-configuration of network stations with the addresses of their neighbors.
- stations, or nodes, in the network In a communications network it is usually desirable that stations, or nodes, in the network "know" the addresses of their neighbors, i.e. the other stations with which they can communicate directly. It is particularly important that routers contain this information, so that they can efficiently direct messages along paths leading to the message destinations.
- Each station can be configured manually with the addresses of other stations with which it directly communicates. However this does not provide for the efficient configuration of stations having large numbers, for example, hundreds of neighbors. Nor does it provide for the efficient inclusion of additional stations or the removal of stations from the system.
- One station is selected as a designated station, e.g. on the basis of a priority, such as high or low identification number as compared with the identification of its neighbors. All the other stations periodically send to the designated station Is-Hello messages identifying themselves to the designated station. The designated station maintains an address list of all of the neighboring stations and periodically communicates this list to each of them in Dn-Hello messages.
- a priority such as high or low identification number as compared with the identification of its neighbors.
- All the other stations periodically send to the designated station Is-Hello messages identifying themselves to the designated station.
- the designated station maintains an address list of all of the neighboring stations and periodically communicates this list to each of them in Dn-Hello messages.
- Each station is initially configured with a list containing the address of at least one other station in its neighborhood.
- each other station initially assumes that it is the designated station and it sends Dn-Hello messages to each of the stations on its list. It also receives Hello messages from other stations. If it receives a Hello message from a station having a hiker priority than the station it currently "believes" is the designated station (which may be itself), it assumes that the sender is the designated station, it ceases sending Dn-Hello messages and begins to send Is-Hello messages to the latter station.
- a station If a station receives a message from a second station, but believes that a third station is the designated station, it sends a Hello-Redirect message to the second station, advising the latter that the third station is the designated station. This protocol will ultimately result in the selection of a single designated station.
- the foregoing protocol will ultimately result in an identification of the designated station to the new station and the inclusion of the new station on the list that is communicated to the other stations by the designated station.
- While the systems discussed above provide efficient mechanisms for the incorporation of additional stations into a network, they are subject to compromise by an intruder who manages to connect an alien station into the network.
- the alien station will be recognized as a legitimate neighboring station and will thus provide unauthorized access to the network.
- an eavesdropper who knows the selection criterion for a designated station can, in some networks, provide an alien station with an address that causes it to become the designated station. The intruder can then wreak havoc by removing legitimate stations from the address list and/or adding other alien stations.
- the principal object of the invention is therefore to prevent the insertion of unauthorized stations into a network. Specifically, it is an object of the invention to provide a system in which only legitimate stations incorporated into the system will be recognized for communications from and to neighboring stations.
- the invention makes use of a password in the messages in which stations identify themselves or other stations to neighboring stations.
- a password can be used by all of the stations in a neighborhood and can be sent in the clear.
- the password must be specific to each station.
- a station specific password through encryption with a single secret shared by all legitimate stations on the link.
- an eavesdropper could impersonate a legitimate station merely by replaying the latter station's password and using its address. Accordingly, in that case we prefer to encrypt a sequence number, such as a time stamp, along with the sender's address. This will prevent a replay attack, since the time stamp in the encrypted password will not match the time of receipt of the bogus message.
- a sequence number such as a time stamp
- the station-identifying information can be encrypted with an algorithm such as the Data Encryption Standard and then decrypted at the receiving end to recover the encrypted information.
- an algorithm such as the Data Encryption Standard
- Yet another password arrangement involves the application of a one-way hash function to the concatenation of the secret key with the sender's address to generate the password. At the receiving end the same function is applied to the concatenation of the secret key with the received identification, the message being authenticated by a match of the result with the transmitted password.
- FIG. 1 is a flow diagram of the operation of a first embodiment of the invention
- FIG. 2 is a flow diagram of the operation of a second embodiment of the invention.
- FIG. 3 depicts a third embodiment of the invention.
- FIG. 4 is a block diagram depicting an apparatus for communicating addresses of neighbor stations to a station within a communication network.
- FIG. 1 illustrates the application of the invention, in a relatively simple form, to a communication medium in which a station cannot impersonate another station, i.e. cannot direct messages to itself by using the identification of another station.
- the password is the encrypted form of an identification of the station, e.g. its data link layer address.
- the encryption may be performed in accordance with the Data Encryption Standard (See “Data Encryption Standard", Federal Information Processing Standards Publication No. 46, January 1977; "DES Modes of Operation", Federal Information Processing Standards Publication No. 81, December 1980).
- the encryption key is resident only in the stations in the same neighborhood. Accordingly, as indicated in the box 10 of FIG. 1, a station that is to transmit a Hello message generates, as a password, the encrypted form of its data link address.
- the station then transmits the Hello message, including as part of the message the password generated as in box 10.
- the station to which the message was directed decrypts the password as indicated in box 14 and then compares the encrypted password with the sender's unencrypted identification transmitted with the message. In the present example this is the sender's address contained in the data link header. If the two versions of the password are the same, the station responds appropriately as indicated in box 18. Thus if the message is a Dn-Hello message, it brings its internal station list into conformance with the list contained in the message. If the incoming message is an Is-Hello message, it adds the message to its station list if it "believes" it is the designated station. If it "knows" it is not the designated station, it replies with a Hello Redirect message identifying the station it believes to be the designated station.
- the receiving station may encrypt the sender's address contained in the data link header and compare the result with the received password. In either case, the encrypted identity is compared with a non-encrypted identity supplied by the sender of the message.
- FIG. 2 we have illustrated the application of the invention to a network in which a station can be configured to impersonate another station by using the latter station's identification in communicating with other nodes on the network.
- a password that is unique to the transmitting station and is also time variant so that it continually changes. Specifically, as shown in box 20, a station that is to transmit a Hello message generates a password by encrypting a concatenation of its identification and a time stamp that indicates the time interval during which the message is being transmitted. As indicated in box 22, the password is included in the Hello message which is transmitted by the station.
- the station to which the Hello message is addressed decrypts the password. As indicated at box 26, it checks the time stamp. If the decrypted time stamp is acceptably close to the present time, the station proceeds to compare the decrypted identification with the identification of the transmitting station included in the data link header, as indicated in box 28. If the two identifications match, the receiving station then takes the appropriate response as indicated at 30.
- FIG. 3 we have illustrated a password system that requires less transmission overhead than the systems depicted in FIGS. 1 and 2.
- This arrangement makes use of a random number S which is a shared secret among the legitimate stations in the neighborhood.
- the password is generated by applying a cryptographic function, such as a one-way hash function, to a combination, e.g. concatenation, of S, the identification of the transmitting station and a time stamp. Again the password is transmitted as part of the Hello message.
- the same cryptographic function is also applied, this time to the concatenation of S, the present time and the identification of the transmitting station as contained in the data link header.
- the result is compared with the transmitted password as indicated in the box 34 and if the two numbers are the same indicating that the Hello message has been received from a legitimate station, the recipient station engages in the appropriate response as indicated in box 36.
- an apparatus 40 which communicates to a station 41a in a communication network 70 addresses of other stations 41b-41e within the communication network 70 that the station 41a is capable of communicating with directly is shown.
- the other stations 41b-41e which can communicate directly with station 41a, are referred to as neighbors of the station 41a.
- the apparatus 40 includes an apparatus to implement a message protocol 42 to exchange identifying messages between the station 41a and the neighbors of the station 41b-41e thus identifying the neighbors 41b-41e to the station 41a.
- the apparatus 40 also includes an apparatus to include a password 44 with each of the identifying messages and, an apparatus to restrict communications 46 between the station 41a and the neighbors of the station 41b-41e to those neighbors of the station 41b-41e identified to the station 41a through identifying messages which contain the password.
- Each station 41a-41e within the communication network 70 includes storage for a common secret number 48, and an apparatus to form the password 50 by using the secret number 48' to encrypt an identification of the station 52.
- FIG. 4 also shows each station 41a-41e which receives one of the identifying messages includes an apparatus 54 to compare the identification of a transmitting station as encrypted in the password 52' included with each identifying message to a non-encrypted identification of the transmitting station 52", and an apparatus to respond to the identifying message 58 only if the identification of the transmitting station as encrypted 52' corresponds with the non-encrypted identification of the transmitting station 52".
- the apparatus to form the password 50 may also include an apparatus responsive to the secret number 66 to encrypt a combination of a time stamp 60 and the identification of the station 52.
- each station receiving one of the identifying messages also includes an apparatus to decrypt the password 62, an apparatus to make a first comparison of the encrypted time stamp with a time of receipt of the identifying message 64 and an apparatus to make a second comparison of a transmitting station identification in the password with a received unencrypted identification of the transmitting station 54, and an apparatus to respond to the identifying message 58 only if both comparisons are positive.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/086,596 US5351295A (en) | 1993-07-01 | 1993-07-01 | Secure method of neighbor discovery over a multiaccess medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/086,596 US5351295A (en) | 1993-07-01 | 1993-07-01 | Secure method of neighbor discovery over a multiaccess medium |
Publications (1)
Publication Number | Publication Date |
---|---|
US5351295A true US5351295A (en) | 1994-09-27 |
Family
ID=22199619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/086,596 Expired - Lifetime US5351295A (en) | 1993-07-01 | 1993-07-01 | Secure method of neighbor discovery over a multiaccess medium |
Country Status (1)
Country | Link |
---|---|
US (1) | US5351295A (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5574860A (en) * | 1993-03-11 | 1996-11-12 | Digital Equipment Corporation | Method of neighbor discovery over a multiaccess nonbroadcast medium |
EP0768595A1 (en) * | 1995-10-12 | 1997-04-16 | International Business Machines Corporation | System and method for providing masquerade protection in a computer network using session keys |
WO1998032065A2 (en) * | 1997-01-03 | 1998-07-23 | Fortress Technologies, Inc. | Improved network security device |
US5793869A (en) * | 1996-10-11 | 1998-08-11 | Claflin, Jr.; Raymond E. | Method and apparatus for encoding and data compressing text information |
US5832211A (en) * | 1995-11-13 | 1998-11-03 | International Business Machines Corporation | Propagating plain-text passwords from a main registry to a plurality of foreign registries |
US5838903A (en) * | 1995-11-13 | 1998-11-17 | International Business Machines Corporation | Configurable password integrity servers for use in a shared resource environment |
US5862323A (en) * | 1995-11-13 | 1999-01-19 | International Business Machines Corporation | Retrieving plain-text passwords from a main registry by a plurality of foreign registries |
US6016350A (en) * | 1996-06-28 | 2000-01-18 | Mitsubishi Denki Kabushiki Kaisha | Encryption apparatus for enabling encryption and non-encryption terminals to be connected on the same network |
US6189096B1 (en) * | 1998-05-06 | 2001-02-13 | Kyberpass Corporation | User authentification using a virtual private key |
WO2001099337A1 (en) * | 2000-06-23 | 2001-12-27 | France Telecom | Method for secure biometric authentication/identification, biometric data input module and verification module |
US20020133607A1 (en) * | 2001-03-16 | 2002-09-19 | Pekka Nikander | Address mechanisms in internet protocol |
US20030009698A1 (en) * | 2001-05-30 | 2003-01-09 | Cascadezone, Inc. | Spam avenger |
US20030101360A1 (en) * | 2001-11-23 | 2003-05-29 | International Business Machines Corporation | Method for industrially changing the passwords of AIX/UNIX users |
US6601175B1 (en) * | 1999-03-16 | 2003-07-29 | International Business Machines Corporation | Method and system for providing limited-life machine-specific passwords for data processing systems |
US20030161478A1 (en) * | 2000-06-24 | 2003-08-28 | Nelson Philip Arthur | Sound reproduction systems |
US20040267946A1 (en) * | 2001-09-17 | 2004-12-30 | Paul Caplin | Server access control |
US20050097317A1 (en) * | 2000-01-12 | 2005-05-05 | Jonathan Trostle | Directory enabled secure multicast group communications |
US6901510B1 (en) | 1999-12-22 | 2005-05-31 | Cisco Technology, Inc. | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure |
US6941457B1 (en) | 2000-06-30 | 2005-09-06 | Cisco Technology, Inc. | Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key |
US6987855B1 (en) | 1999-09-10 | 2006-01-17 | Cisco Technology, Inc. | Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups |
US7013389B1 (en) * | 1999-09-29 | 2006-03-14 | Cisco Technology, Inc. | Method and apparatus for creating a secure communication channel among multiple event service nodes |
US7103185B1 (en) | 1999-12-22 | 2006-09-05 | Cisco Technology, Inc. | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
US7142676B1 (en) * | 1999-06-08 | 2006-11-28 | Entrust Limited | Method and apparatus for secure communications using third-party key provider |
US7181014B1 (en) | 1999-09-10 | 2007-02-20 | Cisco Technology, Inc. | Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange |
US20070097904A1 (en) * | 2005-10-28 | 2007-05-03 | Interdigital Technology Corporation | Wireless nodes with active authentication and associated methods |
US7260716B1 (en) | 1999-09-29 | 2007-08-21 | Cisco Technology, Inc. | Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach |
US20070211650A1 (en) * | 1998-10-23 | 2007-09-13 | Brocade Communications Systems, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US7334125B1 (en) | 2001-11-27 | 2008-02-19 | Cisco Technology, Inc. | Facilitating secure communications among multicast nodes in a telecommunications network |
US7434046B1 (en) | 1999-09-10 | 2008-10-07 | Cisco Technology, Inc. | Method and apparatus providing secure multicast group communication |
US20090116649A1 (en) * | 2007-11-01 | 2009-05-07 | Sun Microsystems, Inc. | Revocation of a system administrator in an encrypted file system |
US20090138709A1 (en) * | 2007-11-27 | 2009-05-28 | Finisar Corporation | Optical transceiver with vendor authentication |
US20090265768A1 (en) * | 1999-02-25 | 2009-10-22 | Cidway Technologies, Ltd | Method and apparatus for the secure identification of the owner of a portable device |
US20120185917A1 (en) * | 2000-08-31 | 2012-07-19 | Baum Robert T | Security extensions using at least a portion of layer 2 information or bits in the place of layer 2 information |
US20120240209A1 (en) * | 2004-03-30 | 2012-09-20 | Michael Roeder | Secure information distribution between nodes (network devices) |
US9148286B2 (en) | 2007-10-15 | 2015-09-29 | Finisar Corporation | Protecting against counterfeit electronic devices |
US9584324B2 (en) | 2014-01-13 | 2017-02-28 | Sap Se | Centralized datastore password management |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US4218738A (en) * | 1978-05-05 | 1980-08-19 | International Business Machines Corporation | Method for authenticating the identity of a user of an information system |
US4227253A (en) * | 1977-12-05 | 1980-10-07 | International Business Machines Corporation | Cryptographic communication security for multiple domain networks |
US4430728A (en) * | 1981-12-29 | 1984-02-07 | Marathon Oil Company | Computer terminal security system |
US4626845A (en) * | 1983-02-28 | 1986-12-02 | Epic Systems, Inc. | Subscriber validation system |
US4661991A (en) * | 1984-03-10 | 1987-04-28 | U.S. Philips Corporation | Circuit arrangement for preventing unauthorized access to a communication system which is protected by a subscriber-specific password |
US4815031A (en) * | 1985-09-02 | 1989-03-21 | Nec Corporation | Method for granting a request to authorized data terminal users accessing from any locations |
US4910773A (en) * | 1987-04-03 | 1990-03-20 | Cii Honeywell Bull (Societe Anonyme) | Method of dispatching secret keys to security modules and user cards in a data processing network |
US5050212A (en) * | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5081678A (en) * | 1989-06-28 | 1992-01-14 | Digital Equipment Corporation | Method for utilizing an encrypted key as a key identifier in a data packet in a computer network |
US5136647A (en) * | 1990-08-02 | 1992-08-04 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
US5136646A (en) * | 1991-03-08 | 1992-08-04 | Bell Communications Research, Inc. | Digital document time-stamping with catenate certificate |
US5146499A (en) * | 1989-10-27 | 1992-09-08 | U.S. Philips Corporation | Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification |
US5148479A (en) * | 1991-03-20 | 1992-09-15 | International Business Machines Corp. | Authentication protocols in communication networks |
US5163096A (en) * | 1991-06-06 | 1992-11-10 | International Business Machines Corporation | Storage protection utilizing public storage key control |
-
1993
- 1993-07-01 US US08/086,596 patent/US5351295A/en not_active Expired - Lifetime
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US4227253A (en) * | 1977-12-05 | 1980-10-07 | International Business Machines Corporation | Cryptographic communication security for multiple domain networks |
US4218738A (en) * | 1978-05-05 | 1980-08-19 | International Business Machines Corporation | Method for authenticating the identity of a user of an information system |
US4430728A (en) * | 1981-12-29 | 1984-02-07 | Marathon Oil Company | Computer terminal security system |
US4626845A (en) * | 1983-02-28 | 1986-12-02 | Epic Systems, Inc. | Subscriber validation system |
US4661991A (en) * | 1984-03-10 | 1987-04-28 | U.S. Philips Corporation | Circuit arrangement for preventing unauthorized access to a communication system which is protected by a subscriber-specific password |
US4815031A (en) * | 1985-09-02 | 1989-03-21 | Nec Corporation | Method for granting a request to authorized data terminal users accessing from any locations |
US4910773A (en) * | 1987-04-03 | 1990-03-20 | Cii Honeywell Bull (Societe Anonyme) | Method of dispatching secret keys to security modules and user cards in a data processing network |
US5081678A (en) * | 1989-06-28 | 1992-01-14 | Digital Equipment Corporation | Method for utilizing an encrypted key as a key identifier in a data packet in a computer network |
US5146499A (en) * | 1989-10-27 | 1992-09-08 | U.S. Philips Corporation | Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such system, and a procedure for implementing such authentification |
US5050212A (en) * | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5136647A (en) * | 1990-08-02 | 1992-08-04 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
US5136646A (en) * | 1991-03-08 | 1992-08-04 | Bell Communications Research, Inc. | Digital document time-stamping with catenate certificate |
US5148479A (en) * | 1991-03-20 | 1992-09-15 | International Business Machines Corp. | Authentication protocols in communication networks |
US5163096A (en) * | 1991-06-06 | 1992-11-10 | International Business Machines Corporation | Storage protection utilizing public storage key control |
Cited By (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5574860A (en) * | 1993-03-11 | 1996-11-12 | Digital Equipment Corporation | Method of neighbor discovery over a multiaccess nonbroadcast medium |
EP0768595A1 (en) * | 1995-10-12 | 1997-04-16 | International Business Machines Corporation | System and method for providing masquerade protection in a computer network using session keys |
US5717756A (en) * | 1995-10-12 | 1998-02-10 | International Business Machines Corporation | System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys |
US5832211A (en) * | 1995-11-13 | 1998-11-03 | International Business Machines Corporation | Propagating plain-text passwords from a main registry to a plurality of foreign registries |
US5838903A (en) * | 1995-11-13 | 1998-11-17 | International Business Machines Corporation | Configurable password integrity servers for use in a shared resource environment |
US5862323A (en) * | 1995-11-13 | 1999-01-19 | International Business Machines Corporation | Retrieving plain-text passwords from a main registry by a plurality of foreign registries |
US6016350A (en) * | 1996-06-28 | 2000-01-18 | Mitsubishi Denki Kabushiki Kaisha | Encryption apparatus for enabling encryption and non-encryption terminals to be connected on the same network |
US5793869A (en) * | 1996-10-11 | 1998-08-11 | Claflin, Jr.; Raymond E. | Method and apparatus for encoding and data compressing text information |
US6240513B1 (en) * | 1997-01-03 | 2001-05-29 | Fortress Technologies, Inc. | Network security device |
WO1998032065A2 (en) * | 1997-01-03 | 1998-07-23 | Fortress Technologies, Inc. | Improved network security device |
WO1998032065A3 (en) * | 1997-01-03 | 1998-10-22 | Fortress Technologies Inc | Improved network security device |
US6189096B1 (en) * | 1998-05-06 | 2001-02-13 | Kyberpass Corporation | User authentification using a virtual private key |
US8730840B2 (en) | 1998-10-23 | 2014-05-20 | Polycom, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US8279775B2 (en) * | 1998-10-23 | 2012-10-02 | Brocade Communications Systems, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US20070211650A1 (en) * | 1998-10-23 | 2007-09-13 | Brocade Communications Systems, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US9325701B2 (en) * | 1999-02-25 | 2016-04-26 | Bouyant Holdings Limited | Method and apparatus for the secure authentication of a web-site |
US9231944B2 (en) | 1999-02-25 | 2016-01-05 | Bouyant Holdings Limited | Method and apparatus for the secure authentication of a web site |
US20090265768A1 (en) * | 1999-02-25 | 2009-10-22 | Cidway Technologies, Ltd | Method and apparatus for the secure identification of the owner of a portable device |
US6601175B1 (en) * | 1999-03-16 | 2003-07-29 | International Business Machines Corporation | Method and system for providing limited-life machine-specific passwords for data processing systems |
US7142676B1 (en) * | 1999-06-08 | 2006-11-28 | Entrust Limited | Method and apparatus for secure communications using third-party key provider |
US6987855B1 (en) | 1999-09-10 | 2006-01-17 | Cisco Technology, Inc. | Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups |
US7434046B1 (en) | 1999-09-10 | 2008-10-07 | Cisco Technology, Inc. | Method and apparatus providing secure multicast group communication |
US7181014B1 (en) | 1999-09-10 | 2007-02-20 | Cisco Technology, Inc. | Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange |
US7660983B1 (en) | 1999-09-29 | 2010-02-09 | Cisco Technology, Inc. | Method and apparatus for creating a secure communication channel among multiple event service nodes |
US7260716B1 (en) | 1999-09-29 | 2007-08-21 | Cisco Technology, Inc. | Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach |
US7013389B1 (en) * | 1999-09-29 | 2006-03-14 | Cisco Technology, Inc. | Method and apparatus for creating a secure communication channel among multiple event service nodes |
US7103185B1 (en) | 1999-12-22 | 2006-09-05 | Cisco Technology, Inc. | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
US7383436B2 (en) | 1999-12-22 | 2008-06-03 | Cisco Technology, Inc. | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
US6901510B1 (en) | 1999-12-22 | 2005-05-31 | Cisco Technology, Inc. | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure |
US7089211B1 (en) | 2000-01-12 | 2006-08-08 | Cisco Technology, Inc. | Directory enabled secure multicast group communications |
US7502927B2 (en) | 2000-01-12 | 2009-03-10 | Cisco Technology, Inc. | Directory enabled secure multicast group communications |
US20050097317A1 (en) * | 2000-01-12 | 2005-05-05 | Jonathan Trostle | Directory enabled secure multicast group communications |
US7194632B2 (en) | 2000-06-23 | 2007-03-20 | France Telecom | Method for secure biometric authentication/identification, biometric data input module and verification module |
FR2810822A1 (en) * | 2000-06-23 | 2001-12-28 | France Telecom | Secure biometric authentication/identification method, encrypting biometric data and communicating to verification module |
WO2001099337A1 (en) * | 2000-06-23 | 2001-12-27 | France Telecom | Method for secure biometric authentication/identification, biometric data input module and verification module |
US20030161478A1 (en) * | 2000-06-24 | 2003-08-28 | Nelson Philip Arthur | Sound reproduction systems |
US6941457B1 (en) | 2000-06-30 | 2005-09-06 | Cisco Technology, Inc. | Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key |
US8793764B2 (en) * | 2000-08-31 | 2014-07-29 | Verizon Patent And Licensing Inc. | Security extensions using at least a portion of layer 2 information or bits in the place of layer 2 information |
US20120185917A1 (en) * | 2000-08-31 | 2012-07-19 | Baum Robert T | Security extensions using at least a portion of layer 2 information or bits in the place of layer 2 information |
US20020133607A1 (en) * | 2001-03-16 | 2002-09-19 | Pekka Nikander | Address mechanisms in internet protocol |
US7155500B2 (en) * | 2001-03-16 | 2006-12-26 | Telefonaktiebolaget Lm Ericsson (Publ) | IP address ownership verification mechanism |
US20030009698A1 (en) * | 2001-05-30 | 2003-01-09 | Cascadezone, Inc. | Spam avenger |
US20040267946A1 (en) * | 2001-09-17 | 2004-12-30 | Paul Caplin | Server access control |
US7272722B2 (en) * | 2001-11-23 | 2007-09-18 | International Business Machines Corporation | Method for industrially changing the passwords of AIX/UNIX users |
US20030101360A1 (en) * | 2001-11-23 | 2003-05-29 | International Business Machines Corporation | Method for industrially changing the passwords of AIX/UNIX users |
US7334125B1 (en) | 2001-11-27 | 2008-02-19 | Cisco Technology, Inc. | Facilitating secure communications among multicast nodes in a telecommunications network |
US20120240209A1 (en) * | 2004-03-30 | 2012-09-20 | Michael Roeder | Secure information distribution between nodes (network devices) |
US8762722B2 (en) * | 2004-03-30 | 2014-06-24 | Hewlett-Packard Development Company, L.P. | Secure information distribution between nodes (network devices) |
US8139521B2 (en) | 2005-10-28 | 2012-03-20 | Interdigital Technology Corporation | Wireless nodes with active authentication and associated methods |
US20070097904A1 (en) * | 2005-10-28 | 2007-05-03 | Interdigital Technology Corporation | Wireless nodes with active authentication and associated methods |
US9148286B2 (en) | 2007-10-15 | 2015-09-29 | Finisar Corporation | Protecting against counterfeit electronic devices |
US8150038B2 (en) | 2007-11-01 | 2012-04-03 | Oracle America, Inc. | Revocation of a system administrator in an encrypted file system |
US20090116649A1 (en) * | 2007-11-01 | 2009-05-07 | Sun Microsystems, Inc. | Revocation of a system administrator in an encrypted file system |
US8819423B2 (en) * | 2007-11-27 | 2014-08-26 | Finisar Corporation | Optical transceiver with vendor authentication |
US20090138709A1 (en) * | 2007-11-27 | 2009-05-28 | Finisar Corporation | Optical transceiver with vendor authentication |
US9584324B2 (en) | 2014-01-13 | 2017-02-28 | Sap Se | Centralized datastore password management |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5351295A (en) | Secure method of neighbor discovery over a multiaccess medium | |
CN1833403B (en) | Communication system, communication device and communication method | |
EP1804462B1 (en) | Method and apparatus for transmitting message to wireless devices that are classified into groups | |
CA2690778C (en) | System and method of creating and sending broadcast and multicast data | |
US8254581B2 (en) | Lightweight key distribution and management method for sensor networks | |
US7774594B2 (en) | Method and system for providing strong security in insecure networks | |
US6038322A (en) | Group key distribution | |
US5604807A (en) | System and scheme of cipher communication | |
USRE39360E1 (en) | System for signatureless transmission and reception of data packets between computer networks | |
US8650643B2 (en) | Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor | |
US8385552B2 (en) | Techniques for managing keys using a key server in a network segment | |
US20080307110A1 (en) | Conditional BGP advertising for dynamic group VPN (DGVPN) clients | |
US7877805B1 (en) | Apparatus, method and computer program product for detection of a security breach in a network | |
EP1560396A2 (en) | Method and apparatus for handling authentication on IPv6 network | |
US20100325435A1 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
US7243368B2 (en) | Access control system and method for a networked computer system | |
US7039190B1 (en) | Wireless LAN WEP initialization vector partitioning scheme | |
EP1417801B1 (en) | Security in communications networks | |
CN108712364A (en) | A kind of safety defense system and method for SDN network | |
CN101197828A (en) | A method for implementing secure ARP and network equipment | |
JPH06318939A (en) | Cipher communication system | |
US11973700B2 (en) | Trusted remote management unit | |
Rathod et al. | Efficient Message Transmission Using Hybrid Cryptography | |
KR102698813B1 (en) | System for supporting network connection of vessel and vessel including the same | |
Islam et al. | Link layer security for sahn protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DIGITAL EQUIPMENT CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PERLMAN, RADIA J.;KAUFMAN, CHARLES W.;REEL/FRAME:006614/0776 Effective date: 19930629 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION UNDERGOING PREEXAM PROCESSING |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: COMPAQ INFORMATION TECHNOLOGIES GROUP, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DIGITAL EQUIPMENT CORPORATION;COMPAQ COMPUTER CORPORATION;REEL/FRAME:012447/0903;SIGNING DATES FROM 19991209 TO 20010620 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: CHANGE OF NAME;ASSIGNOR:COMPAQ INFORMANTION TECHNOLOGIES GROUP LP;REEL/FRAME:014102/0224 Effective date: 20021001 |
|
FPAY | Fee payment |
Year of fee payment: 12 |